IN A NUTSHELL:
Connected devices are cool. But the bad guys love to hack them, in order to steal your data, information and privacy. Help fund our effort to combat them!
ABOUT IOT VILLAGE: With the explosion of IoT, consumers and businesses are increasingly bringing connected devices into homes, offices, hospitals and critical infrastructure. Although these devices are supposed to make our lives easier, they actually expose us to incredible amounts of risk when it comes to security and privacy.
Organized by security consulting and research firm Independent Security Evaluators (ISE), the IoT Village delivers security advancements in Internet of Things devices. The village consists of workshops on hacking numerous off-the-shelf devices including medical devices, home appliances, routers, storage devices, and more; live educational talks; and a variety of contests.
The purpose of the Village is to allow researchers to expose the vulnerabilities in IoT devices, so that consumers and businesses can safeguard their most precious assets from attacks perpetuated through these devices
Creating the IoT Village is an expensive endeavor, but most importantly, improving security in IoT is a group effort. We are committed to solving the security problems that IoT presents, and are seeking what we lovingly call "Hacker Backers" who share in that mission.
Check it out at www.iotvillage.org
SUCCESS METRICS: Your donation, no matter how large or small, will help make this hacking event deliver value to the security research community. By discovering vulnerabilities, the good-guy security researchers involved in the village can help the manufacturers of devices better secure them. We aim to deliver at least one (1) critical, 0-day vulnerability in each device examined (and expect a lot more than that for some of them!). Every vulnerability discovered through this event is one taken away from the bad guys to exploit.
WHY DO WE NEED YOUR MONEY? We need to acquire devices, rent furniture, ship equipment, buy airfare, book hotel rooms, issue press releases, buy conference badges and feed volunteers; all of that is on top of the hundreds of man-hours that tireless volunteers are donating! The more funds we can raise, the more devices we can investigate, the more volunteers we can involve, and the more security issues we can resolve.
WHAT DO YOU GET OUT OF IT? You mean besides our undying admiration?! And don't forget about those hugs, people! On a serious note, you get to protect your own assets. Protect your friends, your family. You get to be part of a sliver lining of hope in the face of a looming security catastrophe. Of course, you also get a series of escalating benefits based on the level of contribution you decide to come in at. This event has already seen extensive press coverage, and that will escalate; you get to be a reason that story is being written. And did we mention those hugs?!
PRESS: Due to the nature of and public appetite for groundbreaking security research, press coverage of DEF CON is usually very substantial. Last year for SOHOpelessly Broken alone we had coverage from BBC News, CBS News, CNET, PC World, CIO Magazine, ArsTechnica, The Register, Dark Reading, and dozens of niche blogs.
Press releases were picked up by hundreds of outlets all over the world. The keynote address from Black Hat specifically lauded the contest. More broadly across DEF CON, press coverage from virtually every major mainstream and niche media outlet touched on at least some aspect of the overall conference.
FOR RECRUITERS: Are you a recruiter, marketing executive, or someone who has an interest in broader business benefits from Village participation? Reach out to us at email@example.com for pledge package options.
ABOUT DEF CON: Started in 1993, DEFCON is one of the largest and oldest annual hacker conferences. DEF CON boasts a wide range of activities, including talks, capture the flag, contests, villages, and official music events.
Risks and challenges
Once funded, there is still a long way to go. Most notably, the security researchers still need to discover the vulnerabilities. Then the manufacturers need to fix the vulnerabilities. All of this needs to happen quickly, so the malicious adversaries out there don't discover the vulnerabilities themselves, and start exploiting devices (if good guys discovered the issues, theoretically so could the bad guys!).
These challenges are real, and difficult to overcome. But we will address them head on through thought leadership, working with the manufacturers to help them arrive at an effective resolution, and continuing to stage future iterations of hacking contests to keep driving progress in this area.Learn about accountability on Kickstarter
- (30 days)